legislation what we are covering today are only a limited number of laws and policies in the...
TRANSCRIPT
![Page 1: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/1.jpg)
WORKPLACE POLICIES,
LEGISLATION, AND CODES OF PRACTICE
![Page 2: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/2.jpg)
Legislation
What we are covering today are only a limited number of laws and policies in the workplace relating to:OHSPrivacyInformation TechnologyEqual OpportunitySPAMCopyright
![Page 3: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/3.jpg)
Introduction
Legislation exists to ensure people and organisations follow appropriate rules of society
Legislation is law enacted by parliament Australia is governed by:
Federal lawState lawLocal law
![Page 4: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/4.jpg)
Policies
Policies are statements made by organisations as to how they will comply with legislation
They are a broad statements of intentions
Procedures are how those policies are implemented
![Page 5: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/5.jpg)
Occupational Health & Safety
![Page 6: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/6.jpg)
OHS Legislation
Workplace safety is governed byOccupational Safety and Health Act 1984Occupational Safety and Health Regulations
1996, andCodes of Practice
In Western Australia it is managed by WorkSafe which is part of the Department of Commercehttp://www.commerce.wa.gov.au/worksafe/in
dex.htmhttp://www.safetyline.wa.gov.au/index.html
![Page 7: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/7.jpg)
OHS Legislation OHS is covered in
more detail in your other class
It is important to reiterate OHS is a dual responsibility between employers and employees
Employers Responsibility Provide a safe workplace
free from injury and discrimination
Provide training and support to ensure a safe workplace
Employees Responsibility Not to engage in activities
that are likely to endanger yourself or others
Follow safety instructions and procedures
![Page 8: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/8.jpg)
Privacy
![Page 9: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/9.jpg)
The Privacy Act 1988 The Privacy Act 1988 is a Federal Act The Privacy Act relates to protection of an
individual’s personal information held by business and government (known as entities)
The Act includes 13 Australian Privacy PrinciplesAPPs set out standards, rights and obligations for
the management of personal information APP came into force in March 2014 and
replaced the National Privacy Principles
![Page 10: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/10.jpg)
The Privacy Act 1988 The Privacy Act allows you to:
Know why your personal information is being collected, how it will be used and who it will be disclosed to
Have the option of not identifying yourself, or of using a pseudonym in certain circumstances
Ask for access to your personal information (including your health information)
Stop receiving unwanted direct marketing
Ask for your personal information that is incorrect to be corrected
Make a complaint about an entity covered by the privacy act, if you consider that they have mishandled your personal information.
![Page 11: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/11.jpg)
Australian Privacy Principles:The Categories
1. Consideration of personal information privacy
2. Collection of personal information
3. Dealing with personal information
4. Integrity of personal information
5. Access to, and correction of, personal information
![Page 12: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/12.jpg)
APP Part 1: Consideration of personal information privacy1. Open and transparent management of personal information
2. Anonymity and pseudonymity
The objective of this principle is to ensure an organisation is open and transparent about the way it manages your information.
It must have an up to date Privacy Policy that includes information on
What information is collected How it collects it What it does with your information How you can access your
information Who it might disclose your
information to
Individuals have the right not to identify themselves when dealing with an APP entity.
Individuals can use a pseudonym in place of their actual identity.
![Page 13: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/13.jpg)
APP Part 2: Collection of personal information3. Collection of solicited personal information
4. Dealing with unsolicited personal information
An entity must not collect personal information unless it is directly related to or required for the entity’s functions or activities
Sensitive information must not be collected without the individual’s consent
If an entity receives personal information they should determine if it could’ve been legally obtained under APP3 If Yes – they can store and use that
information If No – they must destroy it or di-identify
it
5. Notification of the collection of personal information At the time or before collection of information an entity must notify the
individual What information is required to be collected The reason for collection If someone else has provided the information they need to inform the individual what
information was collected and by whom
![Page 14: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/14.jpg)
APP Part 3: Dealing with personal information6. Use or disclosure of personal information
7. Direct marketing
If an entity holds information about an individual they must only use that information for the purpose that is was collected for
Exceptions - the information can be used for a secondary purpose under certain conditions If it is directly related to the
primary purpose for collection Legal obligations
If an entity holds personal information about an individual it must not be used for the purpose of direct marketing
Exceptions The organisation collected that
information from the individual The individual would
reasonably expect it to be used for that purpose
Contractual arrangements
![Page 15: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/15.jpg)
APP Part 3: Dealing with personal information8. Cross-border disclosure of personal information
9. Adoption, use or disclosure of government related identifiers
Before an entity can disclose personal information to an individual or entity outside of the Australian Legal Jurisdiction they must ensure that the overseas recipient does not breach any part of the APP
An organisation must not adopt or use an individual’s personal identifier as its own Centrelink Identifiers Student Numbers Medicare Numbers
Exception – Where it is required by law Verification of identification
![Page 16: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/16.jpg)
APP Part 4: Integrity of personal information10. Quality of personal information
11. Security of personal information
An entity must take reasonable steps to ensure that information collected from individuals is accurate, up-to-date, and complete.
An entity must take reasonable steps to ensure that information is protected from Misuse or interference Unauthorised access or
disclosure
![Page 17: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/17.jpg)
APP Part 5: Access to, and correction of, personal information12. Access to personal information
13. Correction of personal information
If an entity holds personal information about an individual they must, when requested by that individual, provide access to the information
Exceptions Legal grounds Threats to life, health or public safety
Organisations must respond to requests within 30 days
Charges for provision of information can only by made by organisations and must not be excessive
An organisation must take reasonable steps to correct personal information when notified by the individual
![Page 18: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/18.jpg)
Privacy Policies
The following websites have had their Privacy Policies updated to meet the new Australian Privacy Principles:Australia Post
○ http://auspost.com.au/privacy.htmlHays Recruitment
○ http://www.hays.com.au/general-content/privacy-policy-2365
Cancer Council○ http://www.cancer.org.au/privacy-policy.html
![Page 19: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/19.jpg)
SPAM & SCAMS
![Page 20: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/20.jpg)
SPAM Legislation SPAM Act (2003) provides legislation to
monitor and restrict unsolicited communications
This covers email, SMS, MMS, and iM The Act provides for 3 distinct requirements
1. Consent
2. Identify, and
3. Unsubscribe http://www.acma.gov.au/web/STANDARD//
pc%3DPC_2008
![Page 21: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/21.jpg)
SPAM: Penalties & Enforcement
ACMA has the responsibility for governing and enforcing penalties Infringement notices by the ACA Penalties imposed by courts under the legislation
Infringement notice penalties for sending spam are $440 per contravention for an individual (with a maximum
of $22,000 for all contraventions that occur on a single day) $2,200 per contravention for a body corporate (with a
maximum of $110,000 for all contraventions that occur on a single day).
Other rules apply, such as Not including an ‘Opt Out’ facility Not identifying yourself/organisation clearly
http://www.caslon.com.au/anzspamprofile2.htm
![Page 22: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/22.jpg)
Scams Lottery SMS scam
Congratulations, you have just won $1M – all you have to do is transfer $1,000 into an account to access your winnings!!!
Mule spam Have I got a job for you??
Phishing spam We are your bank, but we don’t know your account details so
send them to us now! Nigerian scams
Send us all your money and we’ll give you a heap of money in return …
Scam Watch http://www.scamwatch.gov.au/
![Page 23: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/23.jpg)
Buying Online: Consumer Protection Who’s laws apply?
In Australia we are protected by Australian Law and the Australian Competition and Consumer Commission (ACCC)
Australian Consumer Law makes it illegal for businesses to mislead consumers, either in the purchase price or claims in advertising
Is the seller/company legitimate? Do they have a physical address? Are they reputable? Do you know people who have purchased from them before?
Terms and conditions Are these readily available before you make your purchase Click to accept conditions must be made available and accepted
before the transaction is made for them to be legally binding Payment methods
Are they using secure encryption (https)? http://www.accc.gov.au/content/index.phtml/itemId/8135
![Page 24: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/24.jpg)
IT Policies
![Page 25: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/25.jpg)
Information Technology Policies
Use of Information Technology presents some very challenging issuesPersonal use V Business use
Specifically we are going to look at:EmailInternet useComputer use
Policies should always be made available when you commence employment
May also be provided when you log on to a computer
![Page 26: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/26.jpg)
IT Policies: Email
In the workplace your use of email can be monitored by your employer
Organisations will have differing policies on the use of email for personal use
Email should always be considered insecure
Guidelines on Workplace Email:http://www.privacy.gov.au/materials/types/gu
idelines/view/6056
![Page 27: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/27.jpg)
IT Policies: EmailShould Not: Must Not:
Spend excessive time on personal emails
Use inappropriate language
Use significant system resources
And more …
Breach copyright Be offensive, violent, or
indecent Contain sexually explicit
material Incite criminal activities And more …
![Page 28: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/28.jpg)
IT Policies: Internet Use
As with email policies, Internet usage is often monitored in the workplace
May have policies on social media use Must not engage in illegal activities or
visit prohibited websites
![Page 29: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/29.jpg)
IT Policies: Computer Engage in illegal
activities Share logon and
passwords Use passwords that
are secure Copy and distribute
copyright information Industrial espionage
Sabotaging computers Viruses and malware
![Page 30: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/30.jpg)
Equal Opportunity
![Page 31: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/31.jpg)
Equal Opportunity
Age Breastfeeding Family Responsibility Family Status Gender History Impairment Marital Status Political Preferences
Pregnancy Race Racial Harassment Religion Gender Sexual Harassment Sexual Orientation Spent Conviction
Equal Opportunity Act 1984 sets out the grounds for discrimination as:
![Page 32: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/32.jpg)
EO in the workplace
Employers have an obligation to ensure all staff are treated fairly
Jobs are awarded based on merit Staff (Managers and workers) are aware
of their obligations Staff respect the rights of others May have policies on workplace bullying
![Page 33: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/33.jpg)
Equal Opportunity
Equal Opportunity Commission of WAhttp://www.eoc.wa.gov.au/YourRights/EOFor
You.aspx National Anti-Discrimination Information
Gatewayhttp://www.antidiscrimination.gov.au/
Australian Human Rights Commissionhttp://www.hreoc.gov.au/
![Page 34: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/34.jpg)
Copyright
![Page 35: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/35.jpg)
Copyright
Copyright is law that protects the rights of a creator of an original work
Copyright coversWritten worksImages / photographsArtworksAudio (music etc)SoftwareArchitectureChoreography
![Page 36: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/36.jpg)
Copyright Copyright is an implied law – you don’t need
to do anything to be covered by it Copyright gives the owner of the works
exclusive rights to itTo use copyrighted works you need to obtain the
owners permissionCopyright lasts until 70 years after the death of
the owner Fair dealing
Allows for limited use of copyrighted works under certain conditions
1 chapter or 9.99% for education purpose
![Page 37: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/37.jpg)
Do I need to register for Copyright? There is NO registration system for copyright
in Australia
Copyright protection is free and applies
automatically when material is created
There is no formal process that must be
followed
Material is automatically protected by
copyright in Australia, under the Copyright
Act 1968
![Page 38: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/38.jpg)
Acknowledging others’ work We must correctly acknowledge the
work done by others Source code and digital content are
protected under copyright law, and giving credit where credit is due is an important part of teamwork
When you use someone else’s work, or if they worked with you on a project, we must acknowledge their efforts
![Page 39: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/39.jpg)
Copyright Links
Wikipediahttp://en.wikipedia.org/wiki/Copyright
Australian Copyright Councilhttp://www.copyright.org.au/
![Page 40: Legislation What we are covering today are only a limited number of laws and policies in the workplace relating to: OHS Privacy Information Technology](https://reader036.vdocuments.us/reader036/viewer/2022081506/5697bff11a28abf838cbb71a/html5/thumbnails/40.jpg)
Online Infringement: Forum Discussion Online Piracy is it really a
victimless crime? Last year when the fourth
season of Game of Thrones was launched Australian's proved themselves to be one of the biggest offenders worldwide for infringing copyright.
Some people used the excuse that because it was only available on Foxtel and they could afford the subscription payments that it was ok to download it.
If creative arts developers lose money through illegal downloads will they still be able produce their art for consumers?
The Australian Government has launched a discussion paper seeking feedback on changes to the existing legislation to deter online copyright infringement.
The proposals relate to three things:1. the actions an internet service provider (ISP)
must take if its customers are infringing copyright (authorisation liability)
2. enabling content creators to get a court order requiring ISPs to block access to foreign websites that specialise in infringing content (site blocking)
3. extending the current ‘safe harbour’ provisions (which are intended to provide incentives to carriage service providers to curb infringements) to other online service providers such as Google, eBay and universities (safe harbour scheme)
The government wants to content creators and ISPs to work together to establish industry schemes or commercial arrangements that encourage legitimate use and sharing of content, and deter infringing uses. These proposals are intended to support that aim.
http://www.copyright.com.au/about-copyright/policy-and-research/online-infringement